

The Cost of Privacy: Destruction of Data-Mining in Anonymized Data Publishing
Abstract
Keywords
References
A. Blum, K. Ligett, and A. Roth, “A Learning Theory Approach to Non-Interactive Database Privacy,” Proc. 40th Ann. ACM Symp. Theory of Computing (STOC).
E. Adar, “User 4xxxxx9: Anonymizing Query Logs,” Proc. World Wide Web (WWW) Workshop Query Log Analysis, 2007.
R. Baeza-Yates, “Web Usage Mining in Search Engines,” Web Mining: Applications and Techniques, Idea Group, 2004.
R. Jones, B.Rey, O.Madani, and W.Greiner, “Generating Query substitutions,” Proc.15th Int‟l Conf.World Wide Web (WWW) 2006.
J.Han and M.Kamber, Data Mining: Concepts and Techniques, Sept. 2000.
R. Motwani and S.Nabar, “Anonymizing Unstructured Data,” corr,abs/0810.5582, 2008.
A. Machanavajjhala, D. Kifer, J.M. Abowd, J. Gehrke, and L. Vilhuber, “Privacy: Theory Meets Practice on the Map,” Proc. Int‟l Conf. Data Eng. (ICDE), 2008.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.